The use of ip address blocks with default interfaces in a router is described herein. According to one embodiment, an exemplary method includes in response to a request for a first ip address received from a first client at an interface of the network element, assigning the first client an ip address from a first block of ip addresses dynamically allocated from an ip address provider separated from a pool of statically preassigned ip addresses, if there is no ip address remained unassigned in the pool of statically preassigned ip addresses, and advertising reachability information in a network with respect to the first block of the ip addresses dynamically allocated from the ip address provider, such that other entities of the network are aware of the first block of the ip addresses. Other methods and apparatuses are also described.

Patent
   7430614
Priority
Oct 31 2003
Filed
Sep 29 2004
Issued
Sep 30 2008
Expiry
Oct 03 2026
Extension
734 days
Assg.orig
Entity
Large
238
2
EXPIRED
10. A method performed by a network element, comprising:
in response to a request for a first ip address received from a first client at an interface of the network element, assigning the first client an ip address from a first block of ip addresses dynamically allocated from an ip address provider separated from a pool of statically preassigned ip addresses, if there is no ip address remained unassigned in the pool of statical preassigned ip addresses.
advertising reachability information in a network with respect to the first block of the ip addresses dynamically allocated from the ip address provider, such that other entities of the network are aware of the first block of the ip addresses;
receiving from a second client a request for releasing a second ip address previously allocated from the first block of ip addresses;
releasing the second ip address back to the first block of ip addresses without invoking the ip address provider;
determining whether all ip addresses of the first block of ip addresses have been released; and
releasing the first block of ip addresses back to the ip address provider if all ip addresses of the first block of ip addresses have been released.
20. A machine-readable storage medium having excitable code to cause a machine to perform a method, the method comprising:
in response to a request for a first ip address received from a first client at an interface of the network element, assigned the first client an ip address from a first block of ip addresses dynamically allocated from an ip address provider seperated from a pool of staticallv preassigned ip addresses, if there is no ip address remained unassigned in the pool of statically preassigned ip addresses;
advertising reachability information in a network with respect to the first block of the ip addresses dynamically allocated from the ip address provider, such that other entities of the network are aware of the first block of the ip addresses;
receiving from a second client a request for releasing a second ip address previously allocated from the first block of ip addresses;
releasing the second ip address back to the first block of ip addresses without invoking the ip address provider;
determining whether all ip addresses of the first block of ip addresses have been released; and
releasing the first block of ip addresses back to the ip address provider if all ip addresses of the first block of ip addresses have been released.
1. A method performed by a network clement, comprising:
in response to a request for a first ip address received from a first client at an interface of the network clement over an access network, assigning the first client an ip address from a first block of ip addresses dynamically allocated from an ip address provider separated from a pool of statically preassigned ip addresses, if there is no ip address remained unassigned in the pool of statically preassigned ip addresses specifically allocated to the interface, wherein the network element comprises a plurality of interfaces, each interface being associated with a plurality of clients coupled over the access network, wherein each interface is statically allocated with a predetermined range of globally unique ip addresses that can be assigned to any of the clients associated with each interface, and wherein a block of ip addresses is dynamically allocated as a logical interface of a last resort only if there is no statically preassigned ip address corresponding to particular interface available; and
advertising reachability information in a network with respect to the first block of the ip addresses dynamically allocated from the ip address provider, such that other entities of the network are aware of the first block of the ip addresses.
11. A machine-readable storage medium having executable code to cause a machine to perform a method, the method comprising:
in response to a request for a first ip address received from a first client at an interface of the network element, assigning the first client an ip address from a first block of ip addresses dynamically allocated from an ip address provider separated from a pool of statically preassigned ip addresses, if there is no ip address remained unassigned in the pool of statically preassigned ip addresses specifically allocated to the interface, wherein the network element comprises a plurality of interfaces, each interface being associated with a plurality of clients coupled over the access network, wherein each interface is statically allocated with a predetermined range of globally unique ip addresses that can be assigned to any of the clients associated with each interface, and wherein a block of ip addresses is dynamically allocated as a logical interface of a last resort only there is no statically preassigned ip address corresponding to particular interface available; and
advertising reachability information in a network with respect to the first block of the ip addresses dynamically allocated from the ip address provider, such that other entities of the network are aware of the first block of the ip addresses.
21. A network element, comprising:
a processor; and
a memory coupled to the processor to store instructions, when executed by the processor, cause the processor to
in response to a request for a first ip address received from a first client at an interface of the network element. assume the first client an ip address from a first block of ip addresses dynamically allocated from an ip address provider separated from a pool of statically preassigned ip addresses, if there is no ip address remained unassigned in the pool of statically preassigned ip addresses specifically allocated to the interface, wherein the network element comprises a plurality of interfaces, each interface being associated with a plurality of clients coupled over the access network, wherein each interface is statically allocated with a predetermined range of globally unique ip addresses that can be assigned to any of the clients associated with each interface, and wherein a block of ip addresses is dynamically allocated as a logical interface of a last resort only if there is no statically preassigned ip address corresponding to particular interface available, and
advertise reachability information in a network with respect to the first block of the ip addresses dynamically allocated from the ip address provider, such that other entities of the network are aware of the first block of the ip addresses.
7. A method performed by a network element, comprising:
in response to a request for a first ip address received from a first client at an interface of the network element, determining whether there is at least one ip address available from a pool of statically preassigned ip addresses;
determining whether a second block of ip addresses has been previously dynamically allocated from the ip address provider in response to a previous request for an ip address if there is no ip address available from the pool of statically preassigned ip addresses; and
assigning an ip address from the second block of ip addresses previously allocated if the second block of ip addresses exists and contains at least one ip address available;
dynamically allocating a first block of ip addresses from an ip address provider if there is no ip address available from the pool of statically preassigned ip addresses and there is no ip address available from the second block;
assigning the first client an ip address from the first block of ip addresses dynamically allocated from tile ip address provider separated from a pool of statically preassigned ip addresses;
advertising reachability information in a network with respect to the first block of the ip address dynamically allocated from the ip address provider, such that other entities of the network arc aware of the first block of the ip addresses.
17. A machine-readable storage medium having executable code to cause a machine to perform a method, the method comprising:
in response to a request for a first ip address received from a first client at an interface of the network element, determing whether there is at least one ip address available from a pool of statically preassigned ip addresses;
determining whether a second block of ip addresses has been previously dynamically allocated from the ip address provider provider to a previous request for an ip address if there is no ip address available from the pool of statically preassigned ip addresses
assigning an ip address from the second block of ip addresses previously allocated if the second block of ip addresses exists and contains at least one ip address available;
dynamically allocating a first block of ip addresses from an ip address provider if there is no ip address available from the pool of statically preassigned ip addresses and there is no ip address available from the second block;
assigning the first client an ip address from the first block of ip addresses dynamically allocated from the ip address provider separated from a pool of statically preassigned ip addresses; and
advertising reachability information in a network with respect to the first block of the ip addresses dynamically allocated from the ip address provider, such that other entities of the network are aware of the first block of the ip addresses.
2. The method of claim 1, wherein the ip address provider is one of a DHCP server and a RADIUS server coupled to the network element via a backbone.
3. The method of claim 1, wherein the interface is a default interface of the network element.
4. The method of claim 1, further composing:
determining whether there is at least one ip address available from the pool of statically preassigned ip addresses; and
dynamically allocating the first block of ip addresses from the ip address provider if there is no ip address available from the pool of statically preassigned ip addresses.
5. The method of claim 1, further comprising:
receiving from a second client a request for releasing a second ip address previously allocated from the first block of ip addresses; and
releasing the second ip address back to the first block of ip addresses without invoking the ip address provider.
6. The method of claim 5, further comprising:
receiving a request for allocating a third ip address from a third client; and
reassigning the second ip address from the first block of ip addresses to the third client without invoking the ip address provider.
8. The method of claim 7, wherein the first block of ip addresses is dynamically allocated only if the second block of ip addresses does not exist.
9. The method of claim 7, wherein the first block of ip addresses is dynamically allocated only if the second block of ip addresses does not contain at least one ip address available.
12. The machine-readable storage medium of claim 11, wherein the ip address provider is one of a DHCP server and a RADIUS server coupled to the network element via a backbone.
13. The machine-readable storage medium of claim 11, wherein the interface is a default interface of the network element.
14. The machine-readable storage medium of claim 11, wherein the method further comprises:
determining whether there is at least one ip address available from the pool of statically preassigned ip addresses; and
dynamically allocating the first block of ip addresses from the ip address provider if there is no ip address available from the pool of statically preassigned ip addresses.
15. The machine-readable storage medium of claim 11, wherein the method further comprises:
receiving from a second client a request for releasing a second ip address previously allocated from the first block of ip addresses; and
releasing the second ip address back to the first block of ip addresses without invoking the ip address provider.
16. The machine-readable storage medium of claim 15, wherein the method further comprises:
receiving a request for allocating a third ip address from a third client; and
reassigning the second ip address from the first block of ip addresses to the third client without invoking the ip address provider.
18. The machine-readable storage medium of claim 17, wherein the first block of ip addresses is dynamically allocated only if the second block of ip addresses does not exist.
19. The machine-readable storage medium of claim 17, wherein the first block of ip addresses is dynamically allocated only if the second block of ip addresses does not contain at least one ip address available.
22. The network element of claim 21, wherein the interface is a default interface.
23. The network element of claim 21 wherein the ip address provider is one of RADIUS server and DHCP server coupled to the network element through a backbone.

This application claims the benefit of U.S. Provisional Application No. 60/516,200, filed Oct. 31, 2003, which is hereby incorporated by reference.

The present invention relates generally to communications. More particularly, this invention relates to a use of IP address blocks with default interfaces in a router.

In the field of communications, the need for high-speed transmission of data, including video and audio, has continued to increase. Moreover, there has been an increase in the selection of services by which users can connect to a network, such as the Internet. Specifically, Internet Service Providers (ISPs) may allow for connectivity to the Internet through lower-speed connections at different rates, such as 56 kilobits/second, by employing a Plain Old Telephone Service (POTS) line. Other choices for connection, which are at higher speeds, into a network can include Integrated Services Digital Network (ISDN), Digital Subscriber Line (DSL) service, and cable modem service over a Radio Frequency (RF) cable line. Further, other types of content providers may enable a subscriber to receive different types of media, such as a video stream, audio stream, etc.

In a typical DSL network, a network element supports a wide variety of features to facilitate the management, allocation and distribution of IP addresses. Normally, the subscriber profile can be configured locally on the network element or can be retrieved from a remote server (e.g., a RADIUS (remote access dial in user server)). A subscriber profile determines how an IP address (and optionally the associated route for the subscriber LAN) would be provided to a certain subscriber. Similarly, a cable modem user uses a DHCP server to allocate IP addresses for the clients.

Traditionally, the IP addresses provided to the subscribers must exist within the IP address/subnet “boundary” of an interface. That is, an interface must “contain” or “subtend” the IP addresses that are being provided to subscribers. The network element only has to advertise (e.g., perform network broadcast) for the interfaces (not each IP address assigned to each interface). However, since those IP addresses are preprovisioned in relatively large blocks, it is not uncommon for them to be unused IP addresses (an IP address assigned a subnet that is not assigned to a subscriber due to a lack of demand cannot be used by another router). This is unfortunate because IP addresses can be a scarce resource.

When the IP addresses are not adequate, a default interface, also referred to as interface of last resort, may be used to provide additional IP addresses. In the default interface configuration, the IP addresses provided to the subscribers do not have to exist within IP address/subnet boundary of an interface. That is, the IP addresses provided to the subscribers are decoupled from the interface(s) definition. This allows a single IP subnet to be fully allocated and to be shared across multiple routers. However, the network element has to perform network broadcast for each IP address handed out as an interface of last resort. As a result, large amount of network traffic is generated. In addition, the IP address provider (e.g., DHCP or RADIUS) has to handle each individual IP address request as a last resort, which leads to a heavy load on the IP address provider.

Typically, there are two major approaches to provide IP addresses to the subscribers, traditional approach and a default interface (interface of last resort) approach.

Traditional Approach

This approach is more appropriate for a centralized aggregation model (e.g., BRAS). Utilizing the traditional approach, the following methods are supported on a network element to manage/allocate IP addresses to the subscribers:

In all cases above, an IP interface is configured on the network element that “contains” the IP addresses that are being assigned to the subscribers. For example, following interface may be defined on the network element, or if multiple virtual routers are supported, in a given context (a virtual router or a physical router):

This approach is more commonly used in a more distributed aggregation model. It has also been traditionally used for PPP encapsulated subscribers in a Remote Access dial-up environment. The default interface feature of the network element would provide the capability to decouple IP address assigned to a session from the interface IP address/subnet mask definition. The application of this feature to PPP-encapsulated subscribers would be equivalent to the PPP-default interface feature on the network element. Default Interfaces are applicable to both PPP-encapsulated and CLIPs-encapsulated subscribers.

The default interface for PPP subscribers may be configured to provide PPP sessions an interface to which they can bind in case no other valid interface exists (e.g., a valid interface is one whose IP subnet “contains” the IP address of the subscriber) on a system. Hence also the name: “interface of last resort”. Normally, a PPP session that cannot bind to an interface (due to lack of an interface with a valid matching IP range) simply fails the binding. With the use of default interfaces, this PPP session will instead bind to the interface designated as a “default” interface. The default interface in this instance acts as an interface of last resort. By using such a design, there is no requirement to have all subscribers terminated on a single router interface be assigned addresses from a common IP subnet. This allows for an IP subnet to be shared across many router devices. This allows the service provider to more fully utilize the IP address space allocated to them, as there are no wasted addresses due to allocation inefficiencies (however, IP addresses assigned to a subnet interface may still go unused depending on demand). It also allows the service provider to build redundancy into the access network, provided there is a means to reroute subscriber sessions to a standby router. The default interface works in a similar manner as described above except that the server involved here would be the DHCP server.

The use of IP address blocks with default interfaces in a router is described herein. According to one embodiment, an exemplary method includes in response to a request for a first IP address received from a first client at an interface of the network element, assigning the first client an IP address from a first block of IP addresses dynamically allocated from an IP address provider separated from a pool of statically preassigned IP addresses, if there is no IP address remained unassigned in the pool of statically preassigned IP addresses, and advertising reachability information in a network with respect to the first block of the IP address dynamically allocated from the IP address provider, such that other entities of the network are aware of the first block of the IP addresses. Other methods and apparatuses are also described.

The present invention is illustrated by way of example and not limitation in the figures of the accompanying drawings in which like references indicate similar elements.

FIG. 1 is a diagram illustrating a typical network infrastructure.

FIG. 2 is a diagram illustrating an exemplary network infrastructure according to one embodiment of the invention.

FIG. 3 is a flow diagram illustrating an exemplary process for processing a request for an IP address according to one embodiment of the invention.

FIG. 4 is a flow diagram illustrating an exemplary process for processing a request for releasing an IP address according to one embodiment of the invention.

FIG. 5 is a block diagram illustrating an exemplary data structure which may be used in one embodiment of the invention.

FIG. 6 is a block diagram illustrating an exemplary IP address configuration according to one embodiment of the invention.

The use of IP address blocks with default interfaces in a router is described herein. In the following description, numerous details are set forth to provide a more thorough explanation of the present invention. It will be apparent, however, to one skilled in the art, that the present invention may be practiced without these specific details. In other instances, well-known structures and devices are shown in block diagram form, rather than in detail, in order to avoid obscuring the present invention.

Some portions of the detailed descriptions which follow are presented in terms of algorithms and symbolic representations of operations on data bits within a computer memory. These algorithmic descriptions and representations are the means used by those skilled in the data processing arts to most effectively convey the substance of their work to others skilled in the art. An algorithm is here, and generally, conceived to be a self-consistent finite sequence of steps leading to a desired result. The steps are those requiring physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated. It has proven convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like.

It should be borne in mind, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities. Unless specifically stated otherwise as apparent from the following discussion, it is appreciated that throughout the description, discussions utilizing terms such as “processing” or “computing” or “calculating” or “determining” or “displaying” or the like, refer to the action and processes of a computer system, or similar electronic computing device, that manipulates and transforms data represented as physical (electronic) quantities within the computer system's registers and memories into other data similarly represented as physical quantities within the computer system memories or registers or other such information storage, transmission or display devices.

The invention also relates to one or more different apparatuses for performing the operations herein. This apparatus may be specially constructed for the required purposes (e.g., software, hardware, and/or firmware, etc.), or it may comprise a general purpose computer selectively activated or reconfigured by a computer program stored in the computer. The computer readable medium can be physical/storage media or transmission media instructions of such software, firmware, and computer programs may be stored in a machine readable storage medium, such as, but is not limited to, any type of disk including floppy disks, optical disks, CD-ROMs, and magnetic-optical disks, read-only memories (ROMs), random access memories (RAMs), erasable programmable ROMs (EPROMs), electrically erasable programmable ROMs (EEPROMs), magnetic or optical cards or transmission media such as: electrical, optical, acoustical or other forms of propagated signals (e.g., carrier waves, infrared signals, etc.) or any type of media suitable for storing electronic instructions.

The algorithms and displays presented herein are not inherently related to any particular computer or other apparatus. Various general purpose systems may be used with programs in accordance with the teachings herein, or it may prove convenient to construct more specialized apparatus to perform the required method steps. The required structure for a variety of these systems will appear from the description below. In addition, the present invention is not described with reference to any particular programming language. It will be appreciated that a variety of programming languages may be used to implement the teachings of the invention as described herein.

An Exemplary Network

FIG. 1 is a block diagram of a network configuration according to one embodiment of the invention. In one embodiment, no IP address block(s) is needed to be pre-assigned. The addresses can be assigned to subscribers with no regard for the network element on which that subscriber's session is terminated. In the example shown in FIG. 1, the subscriber session can be terminated on any one of the three units 101-103, in spite of the fact that there is no valid matching interface on any of the systems 101-103.

Referring to FIG. 1, according to one embodiment, as an example, four network element units 101-104 are set up on an Ethernet segments. However, it is not limited so. Units 101-104 are configured as access systems with default interfaces. Unit 104 serves as the upstream router. The backbone interconnecting the four units may be a broadcast multi-access network, such as, for example, an Ethernet.

Note that the subscriber's address has no corresponding interfaces that would normally be considered a “match”. With this configuration, a subscriber can be terminated on any of the three network element units: A, B or C with an address in any of the 10.0.0.1, 10.0.1.1 and 10.0.2.1 subnets. All subscribers bound to the default interface appear to unit D to be directly connected to the backbone network.

Once binding is successful, the backbone router needs to be able to send packets to the newly bound subscriber. One way is to distribute host routes via an Interior Gateway Protocol, such as OSPF or IS-IS, or an exterior gateway protocol such as BGP. A second way is to use proxy-ARP in conjunction with secondary addressing on the aggregation router.

The first method involving the use of routing protocols to distribute host routes. In this model, an interface is flagged as ‘default’ and all subscribers with no matching valid interfaces bind to this default interface. The network element can then be configured to distribute all the reachability information in the form of host routes in a routing protocol. The backbone learns the existence and location of each of the hosts by means of the routing protocol. Routes to hosts that bind to the default interface are treated as subscriber routes. Injecting these routes into the routing protocol requires the administrator to configure redistribution of subscriber routes. One of the advantages of this approach is that there is no requirement to run Proxy-ARP and the administrator has full Layer 3 visibility into each flow at all times. The individual PPP session's IP address will appear as a host entry in the routing table where the session terminates and can be redistributed into a dynamic routing protocol at that point. Proper network design would have a common upstream router summarize these host routes prior to advertising the routes into the backbone.

For the second method, in addition to the default designation, proxy ARP may be configured on another interface to provide IP reachability. Referring to FIG. 1, this is done on the backbone interface for each network element (LAN-A, LAN-B and LAN-C). Interfaces with this command enabled will Proxy-ARP (i.e. generate ARP responses for ARP requests) for any IP address assigned to a PPP session terminated on the default interface on that unit. The backbone router is configured with secondary addresses on the B-RAS/router facing side of the device. An exemplary configuration for unit D of FIG. 1 may be defined as follows:

Method 1 above involving the use of routing protocols to distribute host routes is the more commonly used approach to deal with default interfaces. This creates a problem in that a large number of host routes (/32s) have to be carried in the routing protocol. This number could be as many as 500,000 routes in a single region. While sometimes this level of scaling is not a problem on the network element, it could cause problems on other routers in the network. Reducing the number of routes carried by the routing protocol is highly desirable. A second issue with routing is that subscribers logging on and off the network results in frequent routing protocol updates which effects the backbone routing convergence and quality. Devices on the network other than the network element may also have issues related to the handling of frequent route updates and with having to frequently rerun their algorithms to achieve convergence.

According to one embodiment, one approach to address this problem is via the use of address microblocks when performing address allocation on an IP address provider or supplier, such as, for example, a RADIUS or DHCP server, according to one embodiment. FIG. 2 is a block diagram illustrating an exemplary network configuration according to one embodiment of the invention. In one embodiment, exemplary network configuration 200 includes, but not limited to, one or more network elements 201 and 211, where each network element receives one or more subscribers, such as subscribers 202 and 203 via access network 204 a request for an IP address, which may be handled through one or more routers 207, which may be contexts or virtual routers or physical routers of network element 201. Typically, prior to servicing subscribers 202 and 203, network element 201 has been statically assigned a range of IP address to form one or more preallocated interfaces, also referred to as preassigned IP addresses 208, from an IP address provider or supplier 206 through backbone, such as, for example, a DHCP server or a RADIUS. When network element 201 receives such a request, typically network element 201 hands out an IP address to the client from the preassigned IP address pool 208, or alternatively, from one or more microblocks of IP addresses 209, which have been dynamically assigned to network element 201 as a default interface or an interface of last resort, when no more preassigned IP address is available or an AAA process (performed by a RADIUS) could not match the user information with one of the preallocated interfaces. When the client release an IP address, network element 201 releases the respective IP address back to preassigned IP address pool or microblock IP address pool. Once all of the IP addresses in microblock IP address pool have been released, network element 201 may release the whole microblock of IP addresses back to IP address provider 206 for future use. The released microblock of IP addresses may be reused by other network elements, such as network element 211, when another network element needs to allocate a default interface for its clients. As a result, multiple network elements (e.g., network elements 201 and 211) may share the same pool of IP addresses provided by IP address provider 206 for their respective default interface.

In one embodiment, the RADIUS or DHCP server (whichever is being used to perform address allocation, depending on the encapsulation in use) allocates addresses to the router in microblocks. For example, a RADIUS server capable of supporting address microblocking will perform at least one of the following operations upon receiving a receiving an authentication request from a certain router:

This causes each router to be assigned microblocks of IP addresses. In one embodiment, the subscriber routes assigned in this manner can be tagged as a special route type, such as, for example, subscriber-summary routes. The special route type can be used in enforcing policy decisions when distributing routes. When these types of routes are distributed via the routing protocol, the summary route with the specified microblocking prefix length is advertised. If a router does not understand the microblocking RADIUS VSA, it should ignore the attribute and distribute /32 addresses. The router will also black-hole all packets addressed to addresses in the micro-block that have yet to be assigned to a subscriber. Thus for example, using a microblock size of 8 could reduce the number of routes distributed by a router via the routing protocol by as much as a factor of 8.

In the case of DHCP and CLIPs subscribers, according to one embodiment, the relay-agent or DHCP proxy may send an Option 82 field indicating a microblocking capability when relaying a request. In a particular embodiment, this would include a sub-option of “microblocking” with prefix-length of zero. The DHCP server upon receipt of this Option 82 field (if it supports microblocking) may fill in the sub-option with the correct prefix-length. If the relay-agent does not send this sub-option or option 82, then the DHCP server does not need to send this information in its response.

When there is a requirement to support changes in block size on the DHCP or RADIUS server, according to one embodiment, intelligence may be built into fragment address blocks only as the block of addresses is entirely freed up, either via DHCP lease expiration or via subscribers logging off and terminating their sessions.

FIG. 3 is a flow diagram illustrating an exemplary process for processing a request for an IP address according to one embodiment of the invention. Referring to FIGS. 2 and 3, at block 301, when network element 201 receives a request for an IP address from a client, network element 201 determines whether there is a preassigned IP address available from preassigned IP address pool 208. If there is at least one preassigned IP address from the preassigned IP address pool 208, at block 302, network element 201 assigns an IP address from the preassigned IP address pool 208 to the client.

If there is no more preassigned IP address available, network element 201 determines whether there is at least one IP address in an existing microblock of IP address, which previously dynamically allocated to network element 201 as a default interface. If there is at least one IP address from an existing microblock IP address pool 209, at block 304, network element 201 assigns an IP address out of microblock IP address pool 209. If there is no more IP address available from microblock IP address pool 209 or there is no microblock IP address ever allocated, at block 303, network element 201 may send a request to IP address provider 206 via backbone for a microblock of IP addresses and assign one of the IP addresses in the newly allocated block to the client. Thereafter, at block 305, network element 201 may advertise the reachability information with respect to the block of IP addresses.

It will be appreciated that address microblocking and default interfaces can also be used together with the subscriber binding capability on the network element to provision business customers via unnumbered interfaces on the network element. The RADIUS server can be used to inform the network element about the subscribers IP networks via the Framed-IP-Route attribute. These routes are then installed in the route table as being reachable via the unnumbered default interface.

FIG. 4 is a flow diagram illustrating an exemplary process for releasing an IP address according to one embodiment. Referring to FIGS. 2 and 4, at block 401, when network element 201 receives a request for releasing an IP address previously allocated to a client, network element 201 determines whether the respective IP address was allocated from preassigned IP address pool 208. If the respective IP address was allocated from preassigned IP address pool 208, at block 402, network element 201 releases the IP address back to preassigned IP address pool 208 for future use. If the respective IP address was not allocated from preassigned IP address pool 208, at block 403, network element 201 releases the IP address back to the microblock of IP addresses 209 where it belongs. In addition, network element 201 determines whether all IP addresses in the corresponding microblock of IP addresses have been released. If so, at block 404, network element 201 releases the whole microblock of IP addresses back to IP address provider 206 and at block 405, network element 201 stops advertising the reachability information in the network with respect to the released microblock of IP addresses. Other operations may be included.

In one embodiment, when IP address provider 206 allocates a microblock of IP addresses to network element 201, the microblock of IP addresses may be defined to include a start address and the length of the microblock. FIG. 5 is a block diagram illustrating data structures maintained by a network element and an IP address provider, according to one embodiment. In one embodiment, data structure 501 maintained by a network element may include context ID field 503 and microblock address ID field to indicate which microblock IP addresses is being used by which context or virtual router. Data structure 501 may be implemented as microblock of IP addresses 209 of FIG. 2. Similarly, an IP address provider, such as IP address provider 206, also maintains a data structure 502 to maintain information regarding microblocks of IP addresses allocated. In one embodiment, data structure 502 may include microblock IP address ID field 505 and network element ID field to indicate which microblock of IP addresses has been assigned to which network element.

Referring to FIGS. 2 and 5, according to one embodiment, when network element 201 receives a microblock of IP addresses from IP address provider 206, the microblock includes, but not limited to, a start address and a length of the microblock indicating number of IP addresses in the microblock. In one embodiment, the length of the microblock is indicated by a prefix length of network address, similar to a mask, as exemplary IP address 600 shown in FIG. 6.

For example, referring to FIG. 6, the length of the microblock of IP addresses is specified by a prefixed length of a network address 601 indicating how many bits of the address are used for the network address. The remaining bits 602 indicate the length or size of the microblock. In this example, the remaining bits have 5 bits which may be translated to 32 IP addresses (included in a microblock). It will be appreciated that other mechanisms may be used to indicate the start address and the size of the microblock.

Thus, the use of default interfaces allows for a simple provisioning model where scarce IP addresses can be fully utilized. Further the use of microblocking on RADIUS and DHCP servers in conjunction with support on the router greatly reduces the impact of using such default interfaces on systems and the routing protocols. Address microblocking also reduces the amount of state that has to be carried in routing protocols as well as the frequency of updates. All these factors result in a more scalable, flexible and stable network.

Thus, the use of IP address blocks with default interfaces in a router has been described herein. In the foregoing specification, the invention has been described with reference to specific exemplary embodiments thereof. It will be evident that various modifications may be made thereto without departing from the broader spirit and scope of the invention as set forth in the following claims. The specification and drawings are, accordingly, to be regarded in an illustrative sense rather than a restrictive sense.

Shen, Naiming, Seshadri, Kishore K.

Patent Priority Assignee Title
10051078, Jun 12 2007 ICONTROL NETWORKS, INC WiFi-to-serial encapsulation in systems
10056761, May 02 2011 ICONTROL NETWORKS, INC Power and data solution for remote low-power devices
10062245, Mar 30 2010 iControl Networks, Inc. Cross-client sensor user interface in an integrated security network
10062273, Sep 28 2010 ICONTROL NETWORKS, INC Integrated security system with parallel processing architecture
10078958, Dec 17 2010 ICONTROL NETWORKS, INC Method and system for logging security event data
10079839, Jun 12 2007 ICONTROL NETWORKS, INC Activation of gateway device
10091014, Sep 23 2011 ICONTROL NETWORKS, INC Integrated security network with security alarm signaling system
10117191, Mar 15 2013 iControl Networks, Inc. Adaptive power modulation
10127801, Sep 28 2010 ICONTROL NETWORKS, INC Integrated security system with parallel processing architecture
10127802, Sep 28 2010 ICONTROL NETWORKS, INC Integrated security system with parallel processing architecture
10140840, Apr 23 2007 iControl Networks, Inc. Method and system for providing alternate network access
10142166, Mar 16 2004 iControl Networks, Inc. Takeover of security network
10142392, Jan 24 2007 ICONTROL NETWORKS INC ; ICONTROL NETWORKS, INC Methods and systems for improved system performance
10142394, Jun 12 2007 iControl Networks, Inc. Generating risk profile using data of home monitoring and security system
10156831, Mar 16 2005 iControl Networks, Inc. Automation system with mobile interface
10156959, Mar 16 2005 ICONTROL NETWORKS, INC Cross-client sensor user interface in an integrated security network
10200504, Jun 12 2007 ICONTROL NETWORKS, INC Communication protocols over internet protocol (IP) networks
10212128, Jun 12 2007 ICONTROL NETWORKS, INC Forming a security network including integrated security system components and network devices
10223903, Sep 28 2010 ICONTROL NETWORKS, INC Integrated security system with parallel processing architecture
10225314, Jan 24 2007 ICONTROL NETWORKS, INC Methods and systems for improved system performance
10237237, Jun 12 2007 ICONTROL NETWORKS, INC Communication protocols in integrated systems
10237806, Apr 29 2010 ICONTROL NETWORKS, INC Activation of a home automation controller
10257364, Aug 25 2008 ICONTROL NETWORKS, INC Security system with networked touchscreen and gateway
10275999, Apr 29 2010 ICONTROL NETWORKS, INC Server-based notification of alarm event subsequent to communication failure with armed security system
10277609, Jun 12 2007 ICONTROL NETWORKS, INC Communication protocols in integrated systems
10313303, Jun 12 2007 ICONTROL NETWORKS, INC Forming a security network including integrated security system components and network devices
10332363, Apr 30 2009 iControl Networks, Inc. Controller and interface for home security, monitoring and automation having customizable audio alerts for SMA events
10339791, Jun 12 2007 ICONTROL NETWORKS, INC Security network integrated with premise security system
10348575, Jun 27 2013 ICONTROL NETWORKS, INC Control system user interface
10365810, Jun 27 2013 ICONTROL NETWORKS, INC Control system user interface
10375253, Aug 25 2008 ICONTROL NETWORKS, INC Security system with networked touchscreen and gateway
10380871, Mar 16 2005 ICONTROL NETWORKS, INC Control system user interface
10382452, Jun 12 2007 ICONTROL NETWORKS, INC Communication protocols in integrated systems
10389736, Jun 12 2007 ICONTROL NETWORKS, INC Communication protocols in integrated systems
10423309, Jun 12 2007 iControl Networks, Inc. Device integration framework
10444964, Jun 12 2007 ICONTROL NETWORKS, INC Control system user interface
10447491, Mar 16 2004 iControl Networks, Inc. Premises system management using status signal
10498830, Jun 12 2007 iControl Networks, Inc. Wi-Fi-to-serial encapsulation in systems
10522026, Aug 11 2008 ICONTROL NETWORKS, INC Automation system user interface with three-dimensional display
10523689, Jun 12 2007 ICONTROL NETWORKS, INC Communication protocols over internet protocol (IP) networks
10530839, Aug 11 2008 ICONTROL NETWORKS, INC Integrated cloud system with lightweight gateway for premises automation
10559193, Feb 01 2002 Comcast Cable Communications, LLC Premises management systems
10574060, Apr 30 2010 iControl Networks, Inc. Intelligent power supply and transformation for user devices
10616075, Jun 12 2007 ICONTROL NETWORKS, INC Communication protocols in integrated systems
10616244, Jun 12 2006 iControl Networks, Inc. Activation of gateway device
10645347, Aug 09 2013 ICN ACQUISITION, LLC System, method and apparatus for remote monitoring
10657794, Mar 26 2010 ICONTROL NETWORKS, INC Security, monitoring and automation controller access and use of legacy security control panel information
10659179, Mar 15 2013 iControl Networks, Inc. Adaptive power modulation
10666523, Jun 12 2007 ICONTROL NETWORKS, INC Communication protocols in integrated systems
10672254, Apr 23 2007 iControl Networks, Inc. Method and system for providing alternate network access
10674428, Apr 30 2009 ICONTROL NETWORKS, INC Hardware configurable security, monitoring and automation controller having modular communication protocol interfaces
10691295, Mar 16 2004 iControl Networks, Inc. User interface in a premises network
10692356, Mar 16 2004 iControl Networks, Inc. Control system user interface
10721087, Mar 16 2005 ICONTROL NETWORKS, INC Method for networked touchscreen with integrated interfaces
10735249, Mar 16 2004 iControl Networks, Inc. Management of a security system at a premises
10741057, Dec 17 2010 iControl Networks, Inc. Method and system for processing security event data
10747216, Feb 28 2007 ICONTROL NETWORKS, INC Method and system for communicating with and controlling an alarm system from a remote server
10754304, Mar 16 2004 iControl Networks, Inc. Automation system with mobile interface
10764248, Mar 16 2004 iControl Networks, Inc. Forming a security network including integrated security system components and network devices
10771582, Mar 04 2018 NETSKRT SYSTEMS, INC System and apparatus for intelligently caching data based on predictable schedules of mobile transportation environments
10778800, Mar 04 2018 NETSKRT SYSTEMS, INC System and apparatus for propagating content throughout a network using a mobile environment
10785319, Jun 12 2006 ICONTROL NETWORKS, INC IP device discovery systems and methods
10796557, Mar 16 2004 iControl Networks, Inc. Automation system user interface with three-dimensional display
10813034, Apr 30 2009 ICONTROL NETWORKS, INC Method, system and apparatus for management of applications for an SMA controller
10841381, Mar 16 2005 iControl Networks, Inc. Security system with networked touchscreen
10841668, Aug 09 2013 ICN ACQUISITION, LLC System, method and apparatus for remote monitoring
10880394, Mar 04 2018 NETSKRT SYSTEMS, INC , Transparent cache system and method for transparently caching multimedia content from multiple content providers
10890881, Mar 16 2004 iControl Networks, Inc. Premises management networking
10904351, Mar 04 2018 NETSKRT SYSTEMS, INC System and apparatus for temporally and spatially aggregating connectivity to a mobile cache
10911559, Mar 04 2018 NETSKRT SYSTEMS, INC System and apparatus for implementing a high speed link between a mobile cache and an edge cache
10930136, Mar 16 2005 iControl Networks, Inc. Premise management systems and methods
10942552, Mar 24 2015 iControl Networks, Inc. Integrated security system with parallel processing architecture
10965615, Mar 30 2012 NOKIA SOLUTIONS AND NETWORKS OY Centralized IP address management for distributed gateways
10979389, Mar 16 2004 iControl Networks, Inc. Premises management configuration and control
10992784, Mar 16 2004 ICONTROL NETWORKS, INC Communication protocols over internet protocol (IP) networks
10999254, Mar 16 2005 iControl Networks, Inc. System for data routing in networks
11032242, Mar 16 2004 ICONTROL NETWORKS, INC Communication protocols in integrated systems
11037433, Mar 16 2004 iControl Networks, Inc. Management of a security system at a premises
11043112, Mar 16 2004 iControl Networks, Inc. Integrated security system with parallel processing architecture
11082395, Mar 16 2004 iControl Networks, Inc. Premises management configuration and control
11089122, Jun 12 2007 ICONTROL NETWORKS, INC Controlling data routing among networks
11113950, Mar 16 2005 ICONTROL NETWORKS, INC Gateway integrated with premises security system
11128728, Mar 22 2018 NETSKRT SYSTEMS, INC Method and apparatus for walled garden with a mobile content distribution network
11129084, Apr 30 2009 iControl Networks, Inc. Notification of event subsequent to communication failure with security system
11132888, Apr 23 2007 iControl Networks, Inc. Method and system for providing alternate network access
11140583, Mar 22 2018 NETSKRT SYSTEMS, INC Transforming video manifests to enable efficient media distribution
11146637, Mar 03 2014 ICONTROL NETWORKS, INC Media content management
11153266, Mar 16 2004 iControl Networks, Inc. Gateway registry methods and systems
11159484, Mar 16 2004 iControl Networks, Inc. Forming a security network including integrated security system components and network devices
11175793, Mar 16 2004 iControl Networks, Inc. User interface in a premises network
11182060, Mar 16 2004 iControl Networks, Inc. Networked touchscreen with integrated interfaces
11184322, Mar 16 2005 ICONTROL NETWORKS, INC Communication protocols in integrated systems
11190578, Aug 11 2008 ICONTROL NETWORKS, INC Integrated cloud system with lightweight gateway for premises automation
11194320, Feb 28 2007 iControl Networks, Inc. Method and system for managing communication connectivity
11201755, Mar 16 2004 iControl Networks, Inc. Premises system management using status signal
11212192, Jun 12 2007 iControl Networks, Inc. Communication protocols in integrated systems
11218878, Jun 12 2007 ICONTROL NETWORKS, INC Communication protocols in integrated systems
11223998, Mar 26 2010 iControl Networks, Inc. Security, monitoring and automation controller access and use of legacy security control panel information
11237714, Jun 12 2007 Control Networks, Inc. Control system user interface
11240059, Dec 20 2010 iControl Networks, Inc. Defining and implementing sensor triggered response rules
11244545, Mar 16 2004 iControl Networks, Inc. Cross-client sensor user interface in an integrated security network
11252253, Mar 22 2018 NETSKRT SYSTEMS, INC Caching aggregate content based on limited cache interaction
11258625, Aug 11 2008 ICONTROL NETWORKS, INC Mobile premises automation platform
11277465, Mar 16 2004 iControl Networks, Inc. Generating risk profile using data of home monitoring and security system
11284331, Apr 29 2010 ICONTROL NETWORKS, INC Server-based notification of alarm event subsequent to communication failure with armed security system
11296950, Jun 27 2013 iControl Networks, Inc. Control system user interface
11310199, Mar 16 2004 iControl Networks, Inc. Premises management configuration and control
11316753, Jun 12 2007 iControl Networks, Inc. Communication protocols in integrated systems
11316958, Aug 11 2008 ICONTROL NETWORKS, INC Virtual device systems and methods
11323536, Mar 22 2018 NETSKRT SYSTEMS, INC Apparatus and method for trans-border movement of streaming media content
11341840, Dec 17 2010 iControl Networks, Inc. Method and system for processing security event data
11343380, Mar 16 2004 iControl Networks, Inc. Premises system automation
11356530, Mar 22 2018 NETSKRT SYSTEMS, INC Leveraging mobile environment to distribute cache data
11356926, Apr 30 2009 iControl Networks, Inc. Hardware configurable security, monitoring and automation controller having modular communication protocol interfaces
11367340, Mar 16 2005 iControl Networks, Inc. Premise management systems and methods
11368327, Aug 11 2008 ICONTROL NETWORKS, INC Integrated cloud system for premises automation
11368429, Mar 16 2004 iControl Networks, Inc. Premises management configuration and control
11375036, Mar 22 2018 NETSKRT SYSTEMS, INC Method and apparatus to prioritize and schedule the distribution of learned content
11378922, Mar 16 2004 iControl Networks, Inc. Automation system with mobile interface
11388252, Mar 22 2018 NETSKRT SYSTEMS, INC Micro-cache method and apparatus for a mobile environment with variable connectivity
11394795, Mar 04 2018 NETSKRT SYSTEMS, INC. System and apparatus for implementing a high speed link between a mobile cache and an edge cache
11398147, Sep 28 2010 iControl Networks, Inc. Method, system and apparatus for automated reporting of account and sensor zone information to a central station
11399058, Mar 22 2018 NETSKRT SYSTEMS, INC Immutable ledger method and apparatus for managing the distribution of content
11405463, Mar 03 2014 iControl Networks, Inc. Media content management
11410531, Mar 16 2004 iControl Networks, Inc. Automation system user interface with three-dimensional display
11412027, Jan 24 2007 iControl Networks, Inc. Methods and systems for data communication
11418518, Jun 12 2006 iControl Networks, Inc. Activation of gateway device
11418572, Jan 24 2007 iControl Networks, Inc. Methods and systems for improved system performance
11423756, Jun 12 2007 ICONTROL NETWORKS, INC Communication protocols in integrated systems
11424980, Mar 16 2005 iControl Networks, Inc. Forming a security network including integrated security system components
11432055, Aug 09 2013 ICN ACQUISITION, LLC System, method and apparatus for remote monitoring
11438553, Aug 09 2013 ICN ACQUISITION, LLC System, method and apparatus for remote monitoring
11449012, Mar 16 2004 iControl Networks, Inc. Premises management networking
11451409, Mar 16 2005 iControl Networks, Inc. Security network integrating security system and network devices
11489812, Mar 16 2004 iControl Networks, Inc. Forming a security network including integrated security system components and network devices
11496568, Mar 16 2005 iControl Networks, Inc. Security system with networked touchscreen
11537186, Mar 16 2004 iControl Networks, Inc. Integrated security system with parallel processing architecture
11553399, Apr 30 2009 iControl Networks, Inc. Custom content for premises management
11553579, Mar 14 2013 iControl Networks, Inc. Three-way switch
11582065, Jun 12 2007 ICONTROL NETWORKS, INC Systems and methods for device communication
11588787, Mar 16 2004 iControl Networks, Inc. Premises management configuration and control
11595364, Mar 16 2005 iControl Networks, Inc. System for data routing in networks
11601397, Mar 16 2004 iControl Networks, Inc. Premises management configuration and control
11601810, Jun 12 2007 ICONTROL NETWORKS, INC Communication protocols in integrated systems
11601865, Apr 30 2009 iControl Networks, Inc. Server-based notification of alarm event subsequent to communication failure with armed security system
11611568, Jan 24 2008 iControl Networks, Inc. Communication protocols over internet protocol (IP) networks
11615697, Mar 16 2005 iControl Networks, Inc. Premise management systems and methods
11616659, Aug 11 2008 iControl Networks, Inc. Integrated cloud system for premises automation
11625008, Mar 16 2004 iControl Networks, Inc. Premises management networking
11625161, Jun 12 2007 iControl Networks, Inc. Control system user interface
11626006, Mar 16 2004 iControl Networks, Inc. Management of a security system at a premises
11632308, Jun 12 2007 iControl Networks, Inc. Communication protocols in integrated systems
11641391, Aug 11 2008 iControl Networks Inc. Integrated cloud system with lightweight gateway for premises automation
11646907, Jun 12 2007 iControl Networks, Inc. Communication protocols in integrated systems
11656667, Mar 16 2004 iControl Networks, Inc. Integrated security system with parallel processing architecture
11663902, Apr 23 2007 iControl Networks, Inc. Method and system for providing alternate network access
11665617, Apr 30 2009 iControl Networks, Inc. Server-based notification of alarm event subsequent to communication failure with armed security system
11677577, Mar 16 2004 iControl Networks, Inc. Premises system management using status signal
11700142, Mar 16 2005 iControl Networks, Inc. Security network integrating security system and network devices
11706045, Mar 16 2005 iControl Networks, Inc. Modular electronic display platform
11706279, Jan 24 2007 iControl Networks, Inc. Methods and systems for data communication
11711234, Aug 11 2008 iControl Networks, Inc. Integrated cloud system for premises automation
11722806, Aug 09 2013 ICN ACQUISITION, LLC System, method and apparatus for remote monitoring
11722896, Jun 12 2007 iControl Networks, Inc. Communication protocols in integrated systems
11729255, Aug 11 2008 iControl Networks, Inc. Integrated cloud system with lightweight gateway for premises automation
11736563, Mar 22 2018 NETSKRT SYSTEMS, INC. Immutable ledger method and apparatus for managing the distribution of content
11750414, Dec 16 2010 ICONTROL NETWORKS, INC Bidirectional security sensor communication for a premises security system
11757834, Mar 16 2004 iControl Networks, Inc. Communication protocols in integrated systems
11758026, Aug 11 2008 iControl Networks, Inc. Virtual device systems and methods
11778534, Apr 30 2009 iControl Networks, Inc. Hardware configurable security, monitoring and automation controller having modular communication protocol interfaces
11782394, Mar 16 2004 iControl Networks, Inc. Automation system with mobile interface
11792036, Aug 11 2008 iControl Networks, Inc. Mobile premises automation platform
11792330, Mar 16 2005 iControl Networks, Inc. Communication and automation in a premises management system
11809174, Feb 28 2007 iControl Networks, Inc. Method and system for managing communication connectivity
11810445, Mar 16 2004 iControl Networks, Inc. Cross-client sensor user interface in an integrated security network
11811845, Mar 16 2004 iControl Networks, Inc. Communication protocols over internet protocol (IP) networks
11815969, Aug 10 2007 iControl Networks, Inc. Integrated security system with parallel processing architecture
11816323, Jun 25 2008 iControl Networks, Inc. Automation system user interface
11824675, Mar 16 2005 iControl Networks, Inc. Networked touchscreen with integrated interfaces
11831462, Aug 24 2007 iControl Networks, Inc. Controlling data routing in premises management systems
11856502, Apr 30 2009 ICONTROL NETWORKS, INC Method, system and apparatus for automated inventory reporting of security, monitoring and automation hardware and software at customer premises
11893874, Mar 16 2004 iControl Networks, Inc. Networked touchscreen with integrated interfaces
11894986, Jun 12 2007 iControl Networks, Inc. Communication protocols in integrated systems
11900790, Sep 28 2010 iControl Networks, Inc. Method, system and apparatus for automated reporting of account and sensor zone information to a central station
11916870, Mar 16 2004 iControl Networks, Inc. Gateway registry methods and systems
11916928, Jan 24 2008 iControl Networks, Inc. Communication protocols over internet protocol (IP) networks
11943301, Mar 03 2014 iControl Networks, Inc. Media content management
11962672, Aug 11 2008 iControl Networks, Inc. Virtual device systems and methods
11991306, Mar 16 2004 iControl Networks, Inc. Premises system automation
11997584, Apr 30 2009 iControl Networks, Inc. Activation of a home automation controller
12063220, Mar 16 2004 ICONTROL NETWORKS, INC Communication protocols in integrated systems
12063221, Jun 12 2006 iControl Networks, Inc. Activation of gateway device
12081635, Mar 04 2018 NETSKRT SYSTEMS, INC. System and apparatus for implementing a high speed link between a mobile cache and an edge cache
12088425, Dec 16 2010 iControl Networks, Inc. Bidirectional security sensor communication for a premises security system
12100287, Dec 17 2010 iControl Networks, Inc. Method and system for processing security event data
12120171, Jan 24 2007 iControl Networks, Inc. Methods and systems for data communication
12127095, Apr 30 2009 iControl Networks, Inc. Custom content for premises management
12184443, Jun 12 2007 iControl Networks, Inc. Controlling data routing among networks
12184907, Jun 04 2021 NETSKRT SYSTEMS, INC Method and apparatus for multicast control of a live video stream
7747751, Dec 30 2005 Siemens Aktiengesellschaft IP address allocation method
7911341, Jan 24 2007 ICONTROL NETWORKS INC ; ICONTROL NETWORKS, INC Method for defining and implementing alarm/notification by exception
8082333, Nov 10 2008 Cisco Technology, Inc. DHCP proxy for static host
8214496, Jun 12 2007 iControl Networks, Inc. Gateway registry methods and systems
8271684, Feb 06 2007 Samsung Electronics Co., Ltd. Electronic device, management server, and control method thereof for checking an IP address
8327017, Mar 12 2008 United Services Automobile Association (USAA) Systems and methods for an autonomous intranet
8335842, Mar 16 2004 ICN ACQUISITION, LLC Premises management networking
8473619, Mar 16 2005 ICN ACQUISITION, LLC Security network integrated with premise security system
8478844, Mar 16 2005 ICN ACQUISITION, LLC Forming a security network including integrated security system components and network devices
8478871, Jun 12 2006 ICN ACQUISITION, LLC Gateway registry methods and systems
8533798, Jun 19 2006 AUTHPOINT LLC Method and system for controlling access to networks
8612591, Mar 16 2005 ICN ACQUISITION, LLC Security system with networked touchscreen
8635350, Jun 12 2006 ICONTROL NETWORKS INC ; ICONTROL NETWORKS, INC IP device discovery systems and methods
8713132, Mar 16 2005 ICONTROL NETWORKS, INC Device for data routing in networks
8819178, Mar 16 2005 ICN ACQUISITION, LLC Controlling data routing in integrated security systems
8825871, Mar 16 2005 ICONTROL NETWORKS, INC Controlling data routing among networks
8825904, Sep 23 2009 ZTE Corporation Method, apparatus, system for address management
8988221, Mar 16 2005 ICONTROL NETWORKS, INC Integrated security system with parallel processing architecture
8996665, Mar 16 2005 ICONTROL NETWORKS, INC Takeover processes in security network integrated with premise security system
9059863, Mar 16 2005 ICONTROL NETWORKS, INC Method for data routing in networks
9144143, Apr 30 2010 ICONTROL NETWORKS, INC Power and data solution for remote low-power devices
9172553, Mar 16 2005 ICN ACQUISITION, LLC Security system with networked touchscreen and gateway
9191228, Mar 16 2005 ICONTROL NETWORKS, INC Cross-client sensor user interface in an integrated security network
9287727, Mar 15 2013 ICONTROL NETWORKS, INC Temporal voltage adaptive lithium battery charger
9306809, Jun 12 2007 ICONTROL NETWORKS, INC Security system with networked touchscreen
9349276, Sep 28 2010 ICONTROL NETWORKS, INC Automated reporting of account and sensor information
9412248, Feb 28 2007 ICONTROL NETWORKS, INC Security, monitoring and automation controller access and use of legacy security control panel information
9426720, Apr 30 2009 ICONTROL NETWORKS, INC Controller and interface for home security, monitoring and automation having customizable audio alerts for SMA events
9450776, Mar 16 2005 ICN ACQUISITION, LLC Forming a security network including integrated security system components
9510065, Apr 23 2007 ICONTROL NETWORKS, INC Method and system for automatically providing alternate network access for telecommunications
9531593, Mar 16 2005 iControl Networks, Inc. Takeover processes in security network integrated with premise security system
9609003, Jun 12 2007 ICONTROL NETWORKS, INC Generating risk profile using data of home monitoring and security system
9621408, Jun 12 2007 ICONTROL NETWORKS, INC Gateway registry methods and systems
9628440, Nov 12 2008 ICONTROL NETWORKS, INC Takeover processes in security network integrated with premise security system
9729342, Dec 20 2010 ICONTROL NETWORKS, INC Defining and implementing sensor triggered response rules
9867143, Mar 15 2013 ICONTROL NETWORKS, INC Adaptive Power Modulation
9928975, Mar 14 2013 ICONTROL NETWORKS, INC Three-way switch
ER5277,
ER5799,
Patent Priority Assignee Title
6944167, Oct 24 2000 T-MOBILE INNOVATIONS LLC Method and apparatus for dynamic allocation of private address space based upon domain name service queries
20040139226,
////
Executed onAssignorAssigneeConveyanceFrameReelDoc
Sep 27 2004SHEN, NAIMINGREDBACK NETWORKS, INC ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0158660671 pdf
Sep 27 2004SESHADRI, KISHORE K REDBACK NETWORKS, INC ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0158660671 pdf
Sep 29 2004Redback Networks, Inc.(assignment on the face of the patent)
Jan 25 2007REDBACK NETWORKS INC Ericsson ABASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0240020363 pdf
Date Maintenance Fee Events
Mar 30 2012M1551: Payment of Maintenance Fee, 4th Year, Large Entity.
Mar 30 2016M1552: Payment of Maintenance Fee, 8th Year, Large Entity.
May 18 2020REM: Maintenance Fee Reminder Mailed.
Nov 02 2020EXP: Patent Expired for Failure to Pay Maintenance Fees.


Date Maintenance Schedule
Sep 30 20114 years fee payment window open
Mar 30 20126 months grace period start (w surcharge)
Sep 30 2012patent expiry (for year 4)
Sep 30 20142 years to revive unintentionally abandoned end. (for year 4)
Sep 30 20158 years fee payment window open
Mar 30 20166 months grace period start (w surcharge)
Sep 30 2016patent expiry (for year 8)
Sep 30 20182 years to revive unintentionally abandoned end. (for year 8)
Sep 30 201912 years fee payment window open
Mar 30 20206 months grace period start (w surcharge)
Sep 30 2020patent expiry (for year 12)
Sep 30 20222 years to revive unintentionally abandoned end. (for year 12)